★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW SY0-401 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/SY0-401-dumps.html


Q591. Which of the following would satisfy wireless network implementation requirements to use mutual authentication and usernames and passwords? 

A. EAP-MD5 

B. WEP 

C. PEAP-MSCHAPv2 

D. EAP-TLS 

Answer:

Explanation: 

PEAP-MS-CHAP v2 is easier to deploy than EAP-TLS or PEAP-TLS because user authentication is accomplished via password-base credentials (user name and password) rather than digital certificates or smart cards. 


Q592. Which of the following practices is used to mitigate a known security vulnerability? 

A. Application fuzzing 

B. Patch management 

C. Password cracking 

D. Auditing security logs 

Answer:

Explanation: 

Patch management is the process of maintaining the latest source code for applications and operating systems by applying the latest vendor updates. This helps protect a systems from new attacks and vulnerabilities that have recently become known. 


Q593. The system administrator notices that their application is no longer able to keep up with the large amounts of traffic their server is receiving daily. Several packets are dropped and sometimes the server is taken offline. Which of the following would be a possible solution to look into to ensure their application remains secure and available? 

A. Cloud computing 

B. Full disk encryption 

C. Data Loss Prevention 

D. HSM 

Answer:

Explanation: 

Cloud computing means hosting services and data on the Internet instead of hosting it locally. There is thus no issue when the company’s server is taken offline. 


Q594. Human Resources (HR) would like executives to undergo only two specific security training programs a year. Which of the following provides the BEST level of security training for the executives? (Select TWO). 

A. Acceptable use of social media 

B. Data handling and disposal 

C. Zero day exploits and viruses 

D. Phishing threats and attacks 

E. Clean desk and BYOD 

F. Information security awareness 

Answer: D,F 

Explanation: 

Managers/ i.e. executives in the company are concerned with more global issues in the organization, including enforcing security policies and procedures. Managers should receive additional training or exposure that explains the issues, threats, and methods of dealing with threats. Management will also be concerned about productivity impacts and enforcement and how the various departments are affected by security policies. Phishing is a form of social engineering in which you ask someone for a piece of information that you are missing by making it look as if it is a legitimate request. An email might look as if it is from a bank and contain some basic information, such as the user’s name. Executives an easily fall prey to phishing if they are not trained to lookout for these attacks. 


Q595. A system administrator is responding to a legal order to turn over all logs from all company servers. The system administrator records the system time of all servers to ensure that: 

A. HDD hashes are accurate. 

B. the NTP server works properly. 

C. chain of custody is preserved. 

D. time offset can be calculated. 

Answer:

Explanation: 

It is quite common for workstation times to be off slightly from actual time, and that can happen with servers as well. Since a forensic investigation is usually dependent on a step-by-step account of what has happened, being able to follow events in the correct time sequence is critical. Because of this, it is imperative to record the time offset on each affected machine during the investigation. One method of assisting with this is to add an entry to a log file and note the time that this was done and the time associated with it on the system. 


Q596. An administrator would like to review the effectiveness of existing security in the enterprise. Which of the following would be the BEST place to start? 

A. Review past security incidents and their resolution 

B. Rewrite the existing security policy 

C. Implement an intrusion prevention system 

D. Install honey pot systems 

Answer:

Explanation: 

The main functions of intrusion prevention systems are to identify malicious activity, log information about this activity, attempt to block/stop it, and report it 


Q597. Which of the following devices would be MOST useful to ensure availability when there are a large number of requests to a certain website? 

A. Protocol analyzer 

B. Load balancer 

C. VPN concentrator 

D. Web security gateway 

Answer:

Explanation: 

Load balancing refers to shifting a load from one device to another. A load balancer can be implemented as a software or hardware solution, and it is usually associated with a device—a router, a firewall, NAT appliance, and so on. In its most common implementation, a load balancer splits the traffic intended for a website into individual requests that are then rotated to redundant servers as they become available. 


Q598. Several bins are located throughout a building for secure disposal of sensitive information. 

Which of the following does this prevent? 

A. Dumpster diving 

B. War driving 

C. Tailgating 

D. War chalking 

Answer:

Explanation: 

The bins in this question will be secure bins designed to prevent someone accessing the ‘rubbish’ to learn sensitive information. Dumpster diving is looking for treasure in someone else's trash. (A dumpster is a large trash container.) In the world of information technology, dumpster diving is a technique used to retrieve information that could be used to carry out an attack on a computer network. Dumpster diving isn't limited to searching through the trash for obvious treasures like access codes or passwords written down on sticky notes. Seemingly innocent information like a phone list, calendar, or organizational chart can be used to assist an attacker using social engineering techniques to gain access to the network. To prevent dumpster divers from learning anything valuable from your trash, experts recommend that your company establish a disposal policy where all paper, including print-outs, is shredded in a cross-cut shredder before being recycled, all storage media is erased, and all staff is educated about the danger of untracked trash. 


Q599. Which of the following tools would a security administrator use in order to identify all running services throughout an organization? 

A. Architectural review 

B. Penetration test 

C. Port scanner 

D. Design review 

Answer:

Explanation: 

Different services use different ports. When a service is enabled on a computer, a network port is opened for that service. For example, enabling the HTTP service on a web server will open port 80 on the server. By determining which ports are open on a remote server, we can determine which services are running on that server. A port scanner is a software application designed to probe a server or host for open ports. This is often used by administrators to verify security policies of their networks and by attackers to identify running services on a host with the view to compromise it. A port scan or portscan can be defined as a process that sends client requests to a range of server port addresses on a host, with the goal of finding an active port. While not a nefarious process in and of itself, it is one used by hackers to probe target machine services with the aim of exploiting a known vulnerability of that service. However the majority of uses of a port scan are not attacks and are simple probes to determine services available on a remote machine. 


Q600. Which of the following concepts allows an organization to group large numbers of servers together in order to deliver a common service? 

A. Clustering 

B. RAID 

C. Backup Redundancy 

D. Cold site 

Answer:

Explanation: 

Anytime you connect multiple computers to work/act together as a single server, it is known as 

clustering. Clustered systems utilize parallel processing (improving performance and availability) 

and add redundancy (but also add costs). 

Clustering is done whenever you connect multiple computers to work and act together as a single 

server. It is meant to utilize parallel processing and can also add to redundancy.